Lookup for vulnerable packages by Package URL.

GET /api/packages/75772?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
    "type": "ebuild",
    "namespace": "dev-db",
    "name": "mysql",
    "version": "10.0.28",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "10.0.30-r1",
    "latest_non_vulnerable_version": "10.2.22",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41737?format=api",
            "vulnerability_id": "VCID-39rq-1cg5-9ueu",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80535",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5633"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386576",
                    "reference_id": "1386576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386576"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93702",
                    "reference_id": "93702",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93702"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5633"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39rq-1cg5-9ueu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41745?format=api",
            "vulnerability_id": "VCID-3b6t-dn57-qbhb",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8288",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44537",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44519",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44486",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44508",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44498",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44503",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8288"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386590",
                    "reference_id": "1386590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386590"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93740",
                    "reference_id": "93740",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93740"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8288"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3b6t-dn57-qbhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41728?format=api",
            "vulnerability_id": "VCID-3u5f-yadd-zkf7",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13148",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13038",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13185",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13133",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13035",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13323",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13253",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5625"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386567",
                    "reference_id": "1386567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386567"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93617",
                    "reference_id": "93617",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93617"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5625"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3u5f-yadd-zkf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41724?format=api",
            "vulnerability_id": "VCID-4maq-x6xs-x7gm",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5507",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7148",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71387",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71462",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71429",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71475",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71412",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71428",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7144",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5507"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386556",
                    "reference_id": "1386556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386556"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93678",
                    "reference_id": "93678",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93678"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
                    "reference_id": "RHSA-2016-2749.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5507"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4maq-x6xs-x7gm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41730?format=api",
            "vulnerability_id": "VCID-8bs6-r11g-c3dx",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80157",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80134",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80163",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80095",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80103",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80139",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5627"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386570",
                    "reference_id": "1386570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386570"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93642",
                    "reference_id": "93642",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93642"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5627"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bs6-r11g-c3dx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41725?format=api",
            "vulnerability_id": "VCID-8kvb-5u8c-zbc4",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63214",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63345",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63273",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63337",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63355",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63338",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386557",
                    "reference_id": "1386557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386557"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93735",
                    "reference_id": "93735",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93735"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3706",
                    "reference_id": "dsa-3706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
                    "reference_id": "mariadb-10028-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3109-1/",
                    "reference_id": "USN-3109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3109-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5584"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41726?format=api",
            "vulnerability_id": "VCID-b2aa-32zq-aqd5",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80157",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80134",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80163",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80095",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80103",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80139",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5609"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386559",
                    "reference_id": "1386559",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386559"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93622",
                    "reference_id": "93622",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93622"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5609"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2aa-32zq-aqd5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41734?format=api",
            "vulnerability_id": "VCID-c66q-ap9s-57e1",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80535",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5631"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386574",
                    "reference_id": "1386574",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386574"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93684",
                    "reference_id": "93684",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93684"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5631"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c66q-ap9s-57e1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41735?format=api",
            "vulnerability_id": "VCID-c9c7-nkt8-4baa",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80535",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5632"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386575",
                    "reference_id": "1386575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386575"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93693",
                    "reference_id": "93693",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93693"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5632"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9c7-nkt8-4baa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41746?format=api",
            "vulnerability_id": "VCID-dn63-evjx-5khp",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22534",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22645",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22605",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22706",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22537",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22615",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22668",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8289"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386591",
                    "reference_id": "1386591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386591"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93720",
                    "reference_id": "93720",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8289"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn63-evjx-5khp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=api",
            "vulnerability_id": "VCID-gp4w-bdxg-6kab",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66038",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65954",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65984",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6595",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66001",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66019",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66024",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00501",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65913",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572",
                    "reference_id": "1386572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93668",
                    "reference_id": "93668",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
                    "reference_id": "mariadb-10028-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
                    "reference_id": "mariadb-10118-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
                    "reference_id": "mariadb-5552-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
                    "reference_id": "RHSA-2016-2130.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
                    "reference_id": "RHSA-2016-2131.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
                    "reference_id": "RHSA-2016-2595.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
                    "reference_id": "RHSA-2016-2749.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928",
                    "reference_id": "RHSA-2016:2928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2928"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5629"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41727?format=api",
            "vulnerability_id": "VCID-gyjy-c8wc-qubd",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72217",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72289",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7226",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72302",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72222",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72255",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72267",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561",
                    "reference_id": "1386561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93630",
                    "reference_id": "93630",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93630"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
                    "reference_id": "RHSA-2016-2130.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
                    "reference_id": "RHSA-2016-2131.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
                    "reference_id": "RHSA-2016-2595.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5612"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41733?format=api",
            "vulnerability_id": "VCID-jj46-73tp-nub5",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73293",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73269",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73249",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73242",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73284",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73199",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7322",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73194",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7323",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5630"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386573",
                    "reference_id": "1386573",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386573"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93674",
                    "reference_id": "93674",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93674"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5630"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj46-73tp-nub5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41723?format=api",
            "vulnerability_id": "VCID-jnue-w479-eqdw",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72837",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72942",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72891",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72932",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72843",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72864",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72877",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3495"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386555",
                    "reference_id": "1386555",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386555"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93670",
                    "reference_id": "93670",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93670"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-3495"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnue-w479-eqdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41739?format=api",
            "vulnerability_id": "VCID-k7av-yra2-ckap",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80535",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5635"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386580",
                    "reference_id": "1386580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386580"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93715",
                    "reference_id": "93715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5635"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k7av-yra2-ckap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41743?format=api",
            "vulnerability_id": "VCID-kg6w-jbac-5yf8",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25813",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25804",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25771",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25873",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25916",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25685",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25756",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8286"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386588",
                    "reference_id": "1386588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386588"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93745",
                    "reference_id": "93745",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93745"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8286"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg6w-jbac-5yf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41744?format=api",
            "vulnerability_id": "VCID-kvz9-pnmc-jfbp",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50886",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50839",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50881",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50858",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50801",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50827",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50784",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50841",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8287"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386589",
                    "reference_id": "1386589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386589"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93727",
                    "reference_id": "93727",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93727"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8287"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvz9-pnmc-jfbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41747?format=api",
            "vulnerability_id": "VCID-pchw-5h2a-27fk",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6761",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67736",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67724",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67713",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8290"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386592",
                    "reference_id": "1386592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386592"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93733",
                    "reference_id": "93733",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93733"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8290"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pchw-5h2a-27fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=api",
            "vulnerability_id": "VCID-rted-6vzz-mbcv",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68526",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68451",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68427",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68477",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68494",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6852",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68508",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68513",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68412",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68431",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554",
                    "reference_id": "1386554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93650",
                    "reference_id": "93650",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93650"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
                    "reference_id": "mariadb-10028-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
                    "reference_id": "mariadb-10118-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
                    "reference_id": "mariadb-5552-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
                    "reference_id": "RHSA-2016-2130.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
                    "reference_id": "RHSA-2016-2131.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
                    "reference_id": "RHSA-2016-2595.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
                    "reference_id": "RHSA-2016-2749.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928",
                    "reference_id": "RHSA-2016:2928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2928"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-3492"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41740?format=api",
            "vulnerability_id": "VCID-skzt-r7sx-1ucv",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99553",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99556",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99557",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.89577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9956",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198",
                    "reference_id": "1375198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198"
                },
                {
                    "reference_url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html",
                    "reference_id": "CVE-2016-6662",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py",
                    "reference_id": "CVE-2016-6662",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2058",
                    "reference_id": "RHSA-2016:2058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2058"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2059",
                    "reference_id": "RHSA-2016:2059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2060",
                    "reference_id": "RHSA-2016:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2060"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2061",
                    "reference_id": "RHSA-2016:2061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2061"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2062",
                    "reference_id": "RHSA-2016:2062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2077",
                    "reference_id": "RHSA-2016:2077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928",
                    "reference_id": "RHSA-2016:2928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184",
                    "reference_id": "RHSA-2017:0184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0184"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3078-1/",
                    "reference_id": "USN-3078-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3078-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-6662"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4730?format=api",
            "vulnerability_id": "VCID-tdbv-p3up-vfgv",
            "summary": "SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54789",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54727",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54665",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54771",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54787",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6652"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f"
                },
                {
                    "reference_url": "https://jira.spring.io/browse/DATAJPA-965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://jira.spring.io/browse/DATAJPA-965"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6652"
                },
                {
                    "reference_url": "https://pivotal.io/security/cve-2016-6652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pivotal.io/security/cve-2016-6652"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93276"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xr4v-28rm-pvgw",
                    "reference_id": "GHSA-xr4v-28rm-pvgw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xr4v-28rm-pvgw"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-6652",
                "GHSA-xr4v-28rm-pvgw"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdbv-p3up-vfgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41738?format=api",
            "vulnerability_id": "VCID-teh5-9459-p7a8",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80535",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5634"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386579",
                    "reference_id": "1386579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386579"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93709",
                    "reference_id": "93709",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93709"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5634"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teh5-9459-p7a8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=api",
            "vulnerability_id": "VCID-tvdv-3ed5-h3dt",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58837",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58702",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58776",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58766",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58818",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58842",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58805",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568",
                    "reference_id": "1386568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93638",
                    "reference_id": "93638",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93638"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
                    "reference_id": "mariadb-10028-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
                    "reference_id": "mariadb-10118-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
                    "reference_id": "mariadb-5552-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
                    "reference_id": "RHSA-2016-2130.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
                    "reference_id": "RHSA-2016-2131.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
                    "reference_id": "RHSA-2016-2595.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
                    "reference_id": "RHSA-2016-2749.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928",
                    "reference_id": "RHSA-2016:2928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2928"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5626"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=api",
            "vulnerability_id": "VCID-vh5y-15tw-d7fd",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58292",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58223",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58277",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58283",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.583",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58278",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58258",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5829",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58144",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585",
                    "reference_id": "1386585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93737",
                    "reference_id": "93737",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93737"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
                    "reference_id": "mariadb-10028-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
                    "reference_id": "mariadb-10118-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
                },
                {
                    "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
                    "reference_id": "mariadb-5552-release-notes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130",
                    "reference_id": "RHSA-2016:2130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2130"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
                    "reference_id": "RHSA-2016-2130.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131",
                    "reference_id": "RHSA-2016:2131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2131"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
                    "reference_id": "RHSA-2016-2131.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595",
                    "reference_id": "RHSA-2016:2595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2595"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
                    "reference_id": "RHSA-2016-2595.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749",
                    "reference_id": "RHSA-2016:2749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2749"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
                    "reference_id": "RHSA-2016-2749.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927",
                    "reference_id": "RHSA-2016:2927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928",
                    "reference_id": "RHSA-2016:2928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2928"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8283"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41742?format=api",
            "vulnerability_id": "VCID-wnpa-9f9q-dfbs",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20786",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20822",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20856",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20804",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20794",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20823",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20884",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8284"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386587",
                    "reference_id": "1386587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386587"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93755",
                    "reference_id": "93755",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93755"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601",
                    "reference_id": "RHSA-2016:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1601"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-8284"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnpa-9f9q-dfbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41731?format=api",
            "vulnerability_id": "VCID-zyjr-6hy7-k7ax",
            "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86329",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86415",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86399",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86394",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86357",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86359",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86377",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86387",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5628"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037050",
                    "reference_id": "1037050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386571",
                    "reference_id": "1386571",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386571"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93662",
                    "reference_id": "93662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93662"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-01",
                    "reference_id": "GLSA-201701-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75771?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.6.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75772?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@10.0.28",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
                }
            ],
            "aliases": [
                "CVE-2016-5628"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyjr-6hy7-k7ax"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28"
}